InfoTechTarget and Informa Tech's Digital Businesses Combine.

Together, we power an unparalleled network of 220+ online properties covering 10,000+ granular topics, serving an audience of 50+ million professionals with original, objective content from trusted sources. We help you gain critical insights and make more informed decisions across your business priorities.

Convergence Season 5, Chapter 14: Bridging the SOC Talent Gap with Automation [APAC]

Presented by

Patricia Titus, Field CISO, Abnormal AI (Moderator) Dwayne Smith, SVP of Security & CISO, Vensure Employer Solutions, and Marcos Marrero, CISO, H.I.G. Capital

About this talk

SOC teams are stretched thin, facing persistent skills shortages, burnout, and rising attack volumes. In this session, Abnormal AI’s Field CISO, Patricia Titus, is joined by CISOs Dwayne Smith and Marcos Marrero to discuss how automation and AI can help security teams reclaim time, cut through noise, and focus on meaningful work. Learn how to balance efficiency with human expertise, evolve analyst roles, and build sustainable pipelines of passionate defenders. You’ll leave with strategies to empower lean teams, strengthen retention, and future-proof your SOC in an AI-driven world. You’ll discover how to: - Identify and automate low-value, repetitive SOC tasks - Measure automation ROI and demonstrate value to leadership - Balance AI precision with human context and oversight Redefine career paths and retention through up-skilling and mentorship Register now! **Webinar attendees are eligible for 1 CPE credit through ISC2. Please claim your ISC2 CPE credit here: https://bit.ly/4f3xas3
Abnormal AI

Abnormal AI

16665 subscribers129 talks
Abnormally-Precise, Cloud-Native Email Security
Learn more about new approaches to email security to stop advanced business email compromise attacks that bypass traditional, threat intelligence-based email security solutions. Unlike legacy email security solutions, the Abnormal Security platform uses an innovative AI-based approach that deeply understands the people, relationships, and business processes to stop the most sophisticated and costly attacks.
Related topics